Skip to main content

Shmoocon 2008

Various

Description Forthcoming

42
RESULTS
rss


PART OF
Shmoocon
Hacker Conferences
Media Type
42
movies
Collection
Language
42
English
SHOW DETAILS
up-solid down-solid
eye
Title
Date Archived
Creator
Shmoocon 2008
movies
eye 52
favorite 0
comment 0
I Piss on Your AV shmoocon presentation 2008
Shmoocon 2008
movies
eye 21
favorite 0
comment 0
Malware Software Armoring Circumvention
Shmoocon 2008
movies
eye 17
favorite 0
comment 0
Finding Bad Guys Can Be Fun
Shmoocon 2008
movies
eye 15
favorite 0
comment 0
TL1 Device Security
Advanced Protocol Fuzzing What We Learned when Bringing Layer2 Logic to SPIKE Land Enno Rey and Daniel Mende
Shmoocon 2008
movies
eye 12
favorite 0
comment 0
Practical Hacker Crypto Simple Nomad
VoIP Penetration Testing Lessons Learned John Kindervag and Jason Ostrom
Shmoocon 2008
movies
eye 12
favorite 0
comment 0
A Hacker Looks Past 50 G. Mark Hardy
Flash Drives and Solid State Drives Data Recovery Compan to Hard Drives Animated Scott Moulton
Shmoocon 2008
movies
eye 11
favorite 0
comment 0
Forensic Image Analysis to Recover Passwords d Smith
They're Hacking Our Clients! Why are We Focusing Only on the Servers Jay Beale
Shmoocon 2008
movies
eye 11
favorite 0
comment 0
Smarter Password Cracking Matt Weir
Shmoocon 2008
movies
eye 11
favorite 0
comment 0
Bypassing AV in Windows Vista Mutts
Shmoocon 2008
movies
eye 11
favorite 0
comment 0
Hacking Windows Vista Security Dan Griffin
Web Portals Gateway to Information or a Hole in our Perimeter Defenses Deral Heiland
Shmoocon 2008
movies
eye 9
favorite 0
comment 0
Why are Databases so Hard to Secure Sheeri Cabral
Shmoocon 2008
movies
eye 9
favorite 0
comment 0
Passive Host Characterization Matthew Wollenweber
Shmoocon 2008
movies
eye 9
favorite 0
comment 0
Hacking the Samurai Spirit Isaac Mathis
Shmoocon 2008
movies
eye 9
favorite 0
comment 0
Backtrack Demo
I Will Be Your Eyes and Hands Colossal Cave, Adventure and Reality Jason Scott
When Lawyers Attack! Dealing with the New Rules of Electronic Discovery John Benson, Esq
Path X Explosive Security Testing Tools using XPath Andre Gironda, Marcin Wielgoszewski and Tom Stracener
Shmoocon 2008
movies
eye 8
favorite 0
comment 0
Forced Internet Condom Aaron Higbee and Jaime Fuentes
Shmoocon 2008
movies
eye 8
favorite 0
comment 0
21st Century Shellcode for Solaris Tim Vidas
Shmoocon 2008
movies
eye 8
favorite 0
comment 0
How do I Pwn Thee Let Me Count the Ways RenderMan
Baked not Fried Performing an Unauthorized Phishing Awareness Exercise Syn Phishus
Shmoocon 2008
movies
eye 8
favorite 0
comment 0
Keynote Address Alex Halberman
Shmoocon 2008
movies
eye 8
favorite 0
comment 0
Vulncatcher Fun with Vtrace and Programmatic Debugging atlas
Shmoocon 2008
movies
eye 8
favorite 0
comment 0
Legal Issues for Bot net Researchers and Mitigators Alexander Muentz
PEAP Pwned Extensible Authentication Protocol Josh Wright and Brad Antoniewicz
Shmoocon 2008
movies
eye 7
favorite 0
comment 0
TL1 Device Security Rachel Bicknell
On the Social Responsbility of Hackers Panel Bruce Potter (moderator), Simple Nomad, Johnny Long, Rick Dakan
Shmoocon 2008
movies
eye 7
favorite 0
comment 0
Bypassing Antivirus on Windows Vista muts
Shmoocon 2008
movies
eye 7
favorite 0
comment 0
Malware Software Armoring Circumvention Danny Quist
Shmoocon 2008
movies
eye 7
favorite 0
comment 0
Intercepting Mobile PhoneGSM Traffic H1kari
Shmoocon 2008
movies
eye 7
favorite 0
comment 0
Virtual Worlds Real Exploits Charlie Miller and Dino Dai Zovi
You Must Be This Tall to Ride the Security Ride Joel Wilbanks and Pete Caro
Shmoocon 2008
movies
eye 7
favorite 0
comment 0
SIPing Your Network Radu State, Humberto Abdelnur, and Olivier Festor
Shmoocon 2008
movies
eye 7
favorite 0
comment 0
Got Citrix Hack It! Shanit Gupta
The Geek and the Gumshoe or Can Mathematics and Computers Really Solve Crimes Michael Schearer and Frank
Shmoocon 2008
movies
eye 6
favorite 0
comment 0
0wn the Con The Shmoo Group
Active 802.11 Fingerprinting Gibberish and Secret Handshakes to Know Your AP Sergey Bratus, Cory Cornelius and Daniel Pe